期刊文献+
共找到876篇文章
< 1 2 44 >
每页显示 20 50 100
Exogenous melatonin enhances heat stress tolerance in sweetpotato by modulating antioxidant defense system,osmotic homeostasis and stomatal traits 被引量:1
1
作者 Sunjeet Kumar Rui Yu +5 位作者 Yang Liu Yi Liu Mohammad Nauman Khan Yonghua Liu Mengzhao Wang Guopeng Zhu 《Horticultural Plant Journal》 2025年第1期431-445,共15页
Heat stress hinders the growth and productivity of sweetpotato plants,predominantly through oxidative damage to cellular membranes.Therefore,the development of efficient approaches for mitigating heat-related impairme... Heat stress hinders the growth and productivity of sweetpotato plants,predominantly through oxidative damage to cellular membranes.Therefore,the development of efficient approaches for mitigating heat-related impairments is essential for the long-term production of sweetpotatoes.Melatonin has been recognised for its capacity to assist plants in dealing with abiotic stress conditions.This research aimed to investigate how different doses of exogenous melatonin influence heat damage in sweetpotato plants.Heat stress drastically affected shoot and root fresh weight by 31.8 and 44.5%,respectively.This reduction resulted in oxidative stress characterised by increased formation of hydrogen peroxide(H_(2)O_(2))by 804.4%,superoxide ion(O_(2)^(·-))by 211.5%and malondialdehyde(MDA)by 234.2%.Heat stress also reduced chlorophyll concentration,photosystemⅡefficiency(F_v/F_m)by 15.3%and gaseous exchange.However,pre-treatment with 100μmol L^(-1)melatonin increased growth and reduced oxidative damage to sweetpotato plants under heat stress.In particular,melatonin decreased H_(2)O_(2),O_(2)^(·-)and MDA by 64.8%,42.7%and 38.2%,respectively.Melatonin also mitigated the decline in chlorophyll levels and improved stomatal traits,gaseous exchange and F_(v)/F_(m)(13%).Results suggested that the favorable outcomes of melatonin treatment can be associated with elevated antioxidant enzyme activity and an increase in non-enzymatic antioxidants and osmo-protectants.Overall,these findings indicate that exogenous melatonin can improve heat stress tolerance in sweetpotatoes.This stu dy will assist re searchers in further investigating how melatonin makes sweetpotatoes more resistant to heat stress. 展开更多
关键词 SWEETPOTATO Heat stress MELATONIN Oxidative damage Antioxidant defense system Stomatal traits
在线阅读 下载PDF
Finding the balance: Modifying the cholesterol and steroidal glycoalkaloid synthesis pathway in tomato(Solanum lycopersicum L.) for human health, fruit flavor, and plant defense
2
作者 Vincenzo Averello IV Adrian D.Hegeman Changbin Chen 《Horticultural Plant Journal》 2025年第1期42-56,共15页
Unlike most plants, members of the genus Solanum produce cholesterol and use this as a precursor for steroidal glycoalkaloids. The production of the compounds begins as a branch from brassinosteroid biosynthesis, whic... Unlike most plants, members of the genus Solanum produce cholesterol and use this as a precursor for steroidal glycoalkaloids. The production of the compounds begins as a branch from brassinosteroid biosynthesis, which produces cholesterol that is further modified to produce steroidal glycoalkaloids. During the cholesterol biosynthesis pathway, genetic engineering could alter the formation of cholesterol from provitamin D3(7-dehydrocholesterol) and produce vitamin D3. Cholesterol is a precursor for many steroidal glycoalkaloids, including a-tomatine and esculeoside A. Alpha-tomatine is consumed by mammals and it can reduce cholesterol content and improve LDL:HDL ratio. When there is a high a-tomatine content, the fruit will have a bitter flavor, which together with other steroidal glycoalkaloids serving as protective and defensive compounds for tomato against insect, fungal, and bacterial pests. These compounds also affect the rhizosphere bacteria by recruiting beneficial bacteria. One of the steroidal glycoalkaloids, esculeoside A increases while fruit ripening. This review focuses on recent studies that uncovered key reactions of the production of cholesterol and steroidal glycoalkaloids in tomato connecting to human health, fruit flavor, and plant defense and the potential application for tomato crop improvement. 展开更多
关键词 CHOLESTEROL Steroidal glycoalkaloids TOMATO Biosynthesis a-tomatine STEROLS TERPENOIDS Plant defense
在线阅读 下载PDF
ZmMYC2,selected during modern breeding,orchestrates growth and defense gene expression in maize
3
作者 Shuai Ma Xiangyu Lu +11 位作者 Bo Zhou Jiameng Zhu Qianhe Zhang Suzhen Li Xiaoqing Liu Wenzhu Yang Chunhui Li Yongxiang Li Yu Li Rumei Chen# Xiaojin Zhou Tianyu Wang 《Journal of Integrative Agriculture》 2025年第7期2876-2880,共5页
Highlights ZmMYC2 promoter contains favorable haplotypes selected during domestication,enhancing its expression level in modern maize.ZmMYC2 may balance the trade-off between growth and defense via jasmonate and auxin... Highlights ZmMYC2 promoter contains favorable haplotypes selected during domestication,enhancing its expression level in modern maize.ZmMYC2 may balance the trade-off between growth and defense via jasmonate and auxin signaling pathways.ZmMYC2 regulates drought-response genes(CER2 and TIP3c)to optimize drought stress resilience. 展开更多
关键词 JASMONATE AUXIN GROWTH PROMOTER optimize drought stress resilience jasmonate auxin signaling pathwayszmmyc defense zmmyc
在线阅读 下载PDF
Changes in induced-antipredation defense traits and transcriptome regulation of rotifer Brachionus calyciflorus in response to nanoplastics
4
作者 Huanhuan XU Xiaodan NAN +6 位作者 Yingying GE Yuxiang ZHOU Chunting ZHOU Kangning LIU Zhenzhen LI Man ZHANG Jiaxin YANG 《Journal of Oceanology and Limnology》 2025年第6期1877-1891,共15页
Nanoplastics(less than 1µm in size,NPs)have emerged as a significant pollutant in aquatic environment,posing considerable threats to freshwater biota.However,the mechanisms through which NPs modulate the predatio... Nanoplastics(less than 1µm in size,NPs)have emerged as a significant pollutant in aquatic environment,posing considerable threats to freshwater biota.However,the mechanisms through which NPs modulate the predation responses of these organisms remain poorly elucidated.We investigated the impacts of polystyrene NPs,characterized by a representative particle size(diameter:50 nm;concentration:0–8μg/L),on the anti-predation defense mechanisms of mature rotifer Brachionus calyciflorus against predator of rotifer Asplanchna brightwellii,utilizing transcriptomics to unravel the underlying molecular pathways.Results reveal that the posterolateral spine length and type of B.calyciflorus serve as robust indicators of defensive morphology,even in the presence of NPs exposure.Specifically,increasing concentrations of NPs and predator cues suppressed the defensive responses,which was associated with morphological transformations.This suppression was associated with the down-regulation of the HIF-1αsignaling pathway,implicating potentially its role in modulating fight-or-flight responses.Furthermore,we identified functional crosstalk among multiple signaling pathways,including HIF-1α,PI3K-Akt,FoxO,and mTOR,in B.calyciflorus,which may underpin the organism's responses to polystyrene NP exposure.These findings contribute to the advancement of predictive models to assess the ecological risks posed by polystyrene NPs contamination in aquatic ecosystems. 展开更多
关键词 ROTIFER Brachionus calyciflorus inducible defense Asplanchna kairomones nanoplastic TRANSCRIPTOME
在线阅读 下载PDF
A Dynamic Deceptive Defense Framework for Zero-Day Attacks in IIoT:Integrating Stackelberg Game and Multi-Agent Distributed Deep Deterministic Policy Gradient
5
作者 Shigen Shen Xiaojun Ji Yimeng Liu 《Computers, Materials & Continua》 2025年第11期3997-4021,共25页
The Industrial Internet of Things(IIoT)is increasingly vulnerable to sophisticated cyber threats,particularly zero-day attacks that exploit unknown vulnerabilities and evade traditional security measures.To address th... The Industrial Internet of Things(IIoT)is increasingly vulnerable to sophisticated cyber threats,particularly zero-day attacks that exploit unknown vulnerabilities and evade traditional security measures.To address this critical challenge,this paper proposes a dynamic defense framework named Zero-day-aware Stackelberg Game-based Multi-Agent Distributed Deep Deterministic Policy Gradient(ZSG-MAD3PG).The framework integrates Stackelberg game modeling with the Multi-Agent Distributed Deep Deterministic Policy Gradient(MAD3PG)algorithm and incorporates defensive deception(DD)strategies to achieve adaptive and efficient protection.While conventional methods typically incur considerable resource overhead and exhibit higher latency due to static or rigid defensive mechanisms,the proposed ZSG-MAD3PG framework mitigates these limitations through multi-stage game modeling and adaptive learning,enabling more efficient resource utilization and faster response times.The Stackelberg-based architecture allows defenders to dynamically optimize packet sampling strategies,while attackers adjust their tactics to reach rapid equilibrium.Furthermore,dynamic deception techniques reduce the time required for the concealment of attacks and the overall system burden.A lightweight behavioral fingerprinting detection mechanism further enhances real-time zero-day attack identification within industrial device clusters.ZSG-MAD3PG demonstrates higher true positive rates(TPR)and lower false alarm rates(FAR)compared to existing methods,while also achieving improved latency,resource efficiency,and stealth adaptability in IIoT zero-day defense scenarios. 展开更多
关键词 Industrial internet of things zero-day attacks Stackelberg game distributed deep deterministic policy gradient defensive spoofing dynamic defense
在线阅读 下载PDF
Fruits And Challenges of China-Indonesia Security Cooperation Defense cooperation between the two countries provides important support for regional and even global security
6
作者 Yang Danzhi 《China Report ASEAN》 2025年第4期24-25,共2页
In recent years,China and Indonesia have made notable progress in multiple areas of security cooperation,and their collaboration in this respect has continued to deepen under the leadership of both countries.In Novemb... In recent years,China and Indonesia have made notable progress in multiple areas of security cooperation,and their collaboration in this respect has continued to deepen under the leadership of both countries.In November 2024,China and Indonesia issued a joint statement during Indonesian President Prabowo Subianto’s visit to China.It was his first overseas trip after his inauguration.In the statement,the two countries agreed to add security cooperation as the fifth pillar of their partnership,marking an upgrade of bilateral ties. 展开更多
关键词 defense cooperation bilateral ties global security security cooperation Indonesia regional security joint statement
在线阅读 下载PDF
Effects of nitrate(NO_(3)^(−))stress-induced exacerbated cadmium(Cd^(2+))toxicity on the inflammatory response,oxidative defense,and apoptosis in juvenile Japanese flounder(Paralichthys olivaceus)
7
作者 Jiachen Yu Jie Lian +6 位作者 Yingying Wan Xiangyuan Li Pengfei Liu Qing Ji Suyue Zhou Nianhao Zheng Xingqiang Wang 《Journal of Environmental Sciences》 2025年第6期535-548,共14页
Due to the discharge of industrialwastewater,urban domestic sewage,and intensive marine aquaculture tailwater,nitrate(NO_(3)^(−))pollution has emerged as a significant issue in offshore waters.Nitrate pollution affect... Due to the discharge of industrialwastewater,urban domestic sewage,and intensive marine aquaculture tailwater,nitrate(NO_(3)^(−))pollution has emerged as a significant issue in offshore waters.Nitrate pollution affects aquatic life and may interact with other pollutants,leading to comprehensive toxicity.Cadmium(Cd^(2+))is the most widespread metal contaminant,adversely affecting aquatic life in the coastal waters of China.Despite this,few studies have focused on the synergistic toxicity of NO_(3)^(−)and Cd^(2+)in marine organisms.This study conducted a 30-day exposure experiment on marine Japanese flounder(Paralichthys olivaceus)to explore the synergistic toxicity of NO_(3)^(−)and Cd^(2+).Our results demonstrated that the exposure to Cd^(2+)alone induced slight histopathological changes in the liver.However,malformations such as hepatic vacuolar degeneration and sinusoid dilatationwere exacerbated under co-exposure.Moreover,co-exposure induced the downregulation of antioxidants and the upregulation of the product malonaldehyde(MDA)from lipid peroxidation,indicating potent oxidative stress in the liver.The increased mRNA expression of IL-8,TNF-α,and IL-1β,along with the decreased expression level of TGF-β,indicated a synergistic inflammatory response in the organisms.Furthermore,the co-exposure led to an abnormal expression of P53,caspase-3,caspase-9,Bcl-2,and Bax,and disturbed the apoptosis in the liver through TUNEL staining analysis.Overall,our results imply that co-exposure synergistically affects inflammation,redox status,and apoptosis in flounders.Therefore,the findings from this study provide valuable perspectives on the ecological risk assessment of marine teleosts co-exposure to NO_(3)^(−)and Cd^(2+). 展开更多
关键词 Nitrate pollution Cadmium Japanese flounder Oxidative defense APOPTOSIS
原文传递
From defense chemistry to agroecological solutions:The evolving role of benzoxazinoids in plants
8
作者 Tao Li Xueqin Liu +6 位作者 Sai Zhang Jialei Lei Ruiqi Li Peipei Ma Jianyu Wu Yufang Xu Huiyong Zhang 《The Crop Journal》 2025年第5期1333-1349,共17页
Benzoxazinoids(BXDs)are a class of plant secondary metabolites that play pivotal roles in plant defense against pathogens and pests,as well as in allelopathy.This review synthesizes recent advances in our understandin... Benzoxazinoids(BXDs)are a class of plant secondary metabolites that play pivotal roles in plant defense against pathogens and pests,as well as in allelopathy.This review synthesizes recent advances in our understanding of the structural and functional diversity of BXDs,the independent evolutionary trajectories of their biosynthetic pathways across different plant species,their metabolic transformations in target organisms,and the opportunities and challenges of optimizing BXD biosynthesis in crops through metabolic engineering.Compared with monocotyledons,dicotyledons employ a more diverse set of enzymes to catalyze the core reactions of BXD biosynthesis.This functional divergence—yet biochemical convergence—between monocotyledons and dicotyledons exemplifies the convergent evolution of BXD biosynthetic pathways in plants.BXDs act not only as potent antifeedants,insecticides,and antimicrobials but also function as signaling molecules that induce callose deposition and activate systemic immunity,thereby enhancing plant resistance to biotic stress.Furthermore,BXDs shape the rhizosphere by modulating microbial communities through species-specific antimicrobial activities and microbial detoxification mechanisms,ultimately exerting allelopathic effects that alter soil chemistry and nutrient dynamics.The translational potential of BXDs is increasingly recognized by synthetic biology approaches,including artificial intelligence-driven enzyme optimization,heterologous pathway engineering,and gene-editing to enhance crop resistance.Despite these promising prospects,challenges remain in balancing metabolic trade-offs and mitigating ecological risks associated with persistent accumulation of BXDs.Future research integrating multi-omics,evolutionary genomics,and microbiome studies will be essential to fully harness BXDs for sustainable crop improvement and reduced reliance on synthetic agrochemicals. 展开更多
关键词 Benzoxazinoids BIOSYNTHESIS Plant defense ALLELOPATHY Metabolic engineering
在线阅读 下载PDF
The Nuclear Option-Could It Work for Planetary Defense?
9
作者 Chris Palmer 《Engineering》 2025年第6期6-8,共3页
In a Nature Physics report published in late September 2024[1],a team of scientists and engineers at Sandia National Laboratories(Albuquerque,NM,USA)described the results of a laboratory experiment showing that a nucl... In a Nature Physics report published in late September 2024[1],a team of scientists and engineers at Sandia National Laboratories(Albuquerque,NM,USA)described the results of a laboratory experiment showing that a nuclear blast could create a burst of X-rays powerful enough to change the path of a large asteroid that might one day be on a collision course with Earth. 展开更多
关键词 large asteroid nature physics report asteroid deflection laboratory experiment planetary defense nuclear blast change path X rays
在线阅读 下载PDF
DSGNN:Dual-Shield Defense for Robust Graph Neural Networks
10
作者 Xiaohan Chen Yuanfang Chen +2 位作者 Gyu Myoung Lee Noel Crespi Pierluigi Siano 《Computers, Materials & Continua》 2025年第10期1733-1750,共18页
Graph Neural Networks(GNNs)have demonstrated outstanding capabilities in processing graph-structured data and are increasingly being integrated into large-scale pre-trained models,such as Large Language Models(LLMs),t... Graph Neural Networks(GNNs)have demonstrated outstanding capabilities in processing graph-structured data and are increasingly being integrated into large-scale pre-trained models,such as Large Language Models(LLMs),to enhance structural reasoning,knowledge retrieval,and memory management.The expansion of their application scope imposes higher requirements on the robustness of GNNs.However,as GNNs are applied to more dynamic and heterogeneous environments,they become increasingly vulnerable to real-world perturbations.In particular,graph data frequently encounters joint adversarial perturbations that simultaneously affect both structures and features,which are significantly more challenging than isolated attacks.These disruptions,caused by incomplete data,malicious attacks,or inherent noise,pose substantial threats to the stable and reliable performance of traditional GNN models.To address this issue,this study proposes the Dual-Shield Graph Neural Network(DSGNN),a defense model that simultaneously mitigates structural and feature perturbations.DSGNN utilizes two parallel GNN channels to independently process structural noise and feature noise,and introduces an adaptive fusion mechanism that integrates information from both pathways to generate robust node representations.Theoretical analysis demonstrates that DSGNN achieves a tighter robustness boundary under joint perturbations compared to conventional single-channel methods.Experimental evaluations across Cora,CiteSeer,and Industry datasets show that DSGNN achieves the highest average classification accuracy under various adversarial settings,reaching 81.24%,71.94%,and 81.66%,respectively,outperforming GNNGuard,GCN-Jaccard,GCN-SVD,RGCN,and NoisyGNN.These results underscore the importance of multi-view perturbation decoupling in constructing resilient GNN models for real-world applications. 展开更多
关键词 Graph neural networks adversarial attacks dual-shield defense certified robustness node classification
在线阅读 下载PDF
Key players in plant defense: How scaffold protein GAME15 orchestrates the biosynthesis of steroidal defense metabolite
11
作者 Shengmei Kang Feng Wang 《Advanced Agrochem》 2025年第1期10-12,共3页
GAME15, a scaffold protein, orchestrates the biosynthesis of steroidal glycoalkaloids (a class of compounds with known defensive properties) and steroidal saponins (which contribute to plant defense) in Solanaceae pla... GAME15, a scaffold protein, orchestrates the biosynthesis of steroidal glycoalkaloids (a class of compounds with known defensive properties) and steroidal saponins (which contribute to plant defense) in Solanaceae plants, essential for their defense mechanisms. By assembling key enzymes at the endoplasmic reticulum, GAME15 ensures efficient metabolite production, preventing toxic intermediate diffusion. This breakthrough in plant defense biosynthesis opens opportunities for metabolic engineering, enabling the production of valuable metabolites in non-native hosts and offering potential strategies for crop protection, reducing the need for chemical pesticides. 展开更多
关键词 GAME15 Steroidal glycoalkaloids Steroidal saponins Solanaceae plant Plant defense
在线阅读 下载PDF
Multi-Agent Reinforcement Learning for Moving Target Defense Temporal Decision-Making Approach Based on Stackelberg-FlipIt Games
12
作者 Rongbo Sun Jinlong Fei +1 位作者 Yuefei Zhu Zhongyu Guo 《Computers, Materials & Continua》 2025年第8期3765-3786,共22页
Moving Target Defense(MTD)necessitates scientifically effective decision-making methodologies for defensive technology implementation.While most MTD decision studies focus on accurately identifying optimal strategies,... Moving Target Defense(MTD)necessitates scientifically effective decision-making methodologies for defensive technology implementation.While most MTD decision studies focus on accurately identifying optimal strategies,the issue of optimal defense timing remains underexplored.Current default approaches—periodic or overly frequent MTD triggers—lead to suboptimal trade-offs among system security,performance,and cost.The timing of MTD strategy activation critically impacts both defensive efficacy and operational overhead,yet existing frameworks inadequately address this temporal dimension.To bridge this gap,this paper proposes a Stackelberg-FlipIt game model that formalizes asymmetric cyber conflicts as alternating control over attack surfaces,thereby capturing the dynamic security state evolution of MTD systems.We introduce a belief factor to quantify information asymmetry during adversarial interactions,enhancing the precision of MTD trigger timing.Leveraging this game-theoretic foundation,we employMulti-Agent Reinforcement Learning(MARL)to derive adaptive temporal strategies,optimized via a novel four-dimensional reward function that holistically balances security,performance,cost,and timing.Experimental validation using IP addressmutation against scanning attacks demonstrates stable strategy convergence and accelerated defense response,significantly improving cybersecurity affordability and effectiveness. 展开更多
关键词 Cyber security moving target defense multi-agent reinforcement learning security metrics game theory
在线阅读 下载PDF
Three-body cooperative active defense guidance law with overload constraints:A small speed ratio perspective
13
作者 Shuangxi LIU Zehuai LIN +3 位作者 Yichong WANG Wei HUANG Binbin YAN Yong LI 《Chinese Journal of Aeronautics》 2025年第2期226-243,共18页
In air combat,one effective way to counter an incoming missile attacking an aircraft is to launch a defense missile compared with traditional passive defense strategies such as decoy and electronic countermeasures.To ... In air combat,one effective way to counter an incoming missile attacking an aircraft is to launch a defense missile compared with traditional passive defense strategies such as decoy and electronic countermeasures.To address this issue,this paper proposes a three-body cooperative active defense guidance law with overload constraints from the perspective of a small speed ratio.First,a cooperative guidance-oriented model for active defense is established and linearized to provide a foundation for the design of the guidance law.Then,the essential quantity known as Zero-Effort-Miss(ZEM)is analyzed during the engagement process.In order to minimize the influence of inaccurate estimates of remaining flight time in the ZEM,the concept of Zero-Effort-Velocity(ZEV)is introduced.Subsequently,utilizing the sliding mode control method,the guidance law is designed by selecting the ZEM and ZEV as sliding mode surfaces,combined with the fast power reaching law,and its finite-time stability is analyzed using the Lyapunov method.Furthermore,to quantitatively evaluate the performance of the proposed active defense guidance law,the interception rendezvous angle index is introduced.The proposed active defense guidance law considers integrating information from the incoming missile,aircraft,and defense missile with fewer simplifications and assumptions,and ensures that the aircraft is effectively protected with less overload required for the defense missile.Finally,simulation experiments demonstrate the effectiveness and adaptability of the proposed active defense guidance law. 展开更多
关键词 Three-body active defense Cooperative guidance Guidance law Overload constraint Small speed ratio Sliding mode control
原文传递
The Path of National Awakening From the Perspective of National Defense:A Study of The Eight Hundred
14
作者 HUANG Lei GUO Runlin 《Cultural and Religious Studies》 2025年第11期667-670,共4页
National awakening and the cultivation of national defense consciousness among the populace are deeply interconnected,forming a central narrative theme in Chinese films about the War of Resistance Against Japanese Agg... National awakening and the cultivation of national defense consciousness among the populace are deeply interconnected,forming a central narrative theme in Chinese films about the War of Resistance Against Japanese Aggression.The collective historical memory of the Chinese people’s wartime experience,which embodies the awakening of public defense consciousness,provides a significant historical reference for contemporary national defense development.This paper takes the film The Eight Hundred as a case study,analyzing its dialogues and scenes to trace the process through which national defense consciousness awakens among ordinary people.It concludes that such awakening is an inevitable outcome shaped by moral exemplars and cultural heritage.As an important medium of cultural transmission,War of Resistance-themed films not only construct and perpetuate national defense awareness through historical narratives but also inspire contemporary society to strengthen its defense consciousness through cinematic representation.Furthermore,these films serve as a window for international cross-cultural dialogue.Especially on the 80th anniversary of the victory in the War of Resistance,they showcase to the world the spiritual strength and national resilience of the Chinese people in resisting foreign aggression. 展开更多
关键词 The Eight Hundred national defense consciousness national awakening Chinese War of Resistance films collective memory
在线阅读 下载PDF
Large Prey Growth in the Wolkowicz-Rothe-Shafer Predator-Prey System with Group Defense
15
作者 André ZEGELING LIAO Jin 《数学理论与应用》 2025年第3期1-52,共52页
This paper investigates the number of limit cycles in a predator-prey system with group defense,intially introduced by Wolkowicz and later examined by Rothe and Shafer in the 1980’s.Under the assumption of large prey... This paper investigates the number of limit cycles in a predator-prey system with group defense,intially introduced by Wolkowicz and later examined by Rothe and Shafer in the 1980’s.Under the assumption of large prey growth,the system reduces to a perturbed singular system,whose limit cycles can be analyzed using geometric singular perturbation methods-primarily through the study of a slow-divergence integral.Our work completes partially the results previously obtained by Li and Zhu and by Hsu.We provide a comprehensive classification of all possible singular cycles capable of generating limit cycles and analyze the slow-divergence integral for the nine distinct types of cycle families that arise in a canard explosion.Based on these findings,we demonstrate that the maximum number of limit cycles emerging from the singular cycles is two in all cases,thereby confirming conjectures posed by Rothe-Shafer and Xiao-Ruan. 展开更多
关键词 Predator-prey system Group defense Singular perturbation Limit cycle
在线阅读 下载PDF
A Survey of Adversarial Examples in Computer Vision:Attack,Defense,and Beyond
16
作者 XU Keyizhi LU Yajuan +1 位作者 WANG Zhongyuan LIANG Chao 《Wuhan University Journal of Natural Sciences》 2025年第1期1-20,共20页
Recent years have witnessed the ever-increasing performance of Deep Neural Networks(DNNs)in computer vision tasks.However,researchers have identified a potential vulnerability:carefully crafted adversarial examples ca... Recent years have witnessed the ever-increasing performance of Deep Neural Networks(DNNs)in computer vision tasks.However,researchers have identified a potential vulnerability:carefully crafted adversarial examples can easily mislead DNNs into incorrect behavior via the injection of imperceptible modification to the input data.In this survey,we focus on(1)adversarial attack algorithms to generate adversarial examples,(2)adversarial defense techniques to secure DNNs against adversarial examples,and(3)important problems in the realm of adversarial examples beyond attack and defense,including the theoretical explanations,trade-off issues and benign attacks in adversarial examples.Additionally,we draw a brief comparison between recently published surveys on adversarial examples,and identify the future directions for the research of adversarial examples,such as the generalization of methods and the understanding of transferability,that might be solutions to the open problems in this field. 展开更多
关键词 computer vision adversarial examples adversarial attack adversarial defense
原文传递
An Effective Adversarial Defense Framework:From Robust Feature Perspective
17
作者 Baolin Li Tao Hu +2 位作者 Xinlei Liu Jichao Xie Peng Yi 《Computers, Materials & Continua》 2025年第10期2141-2155,共15页
Deep neural networks are known to be vulnerable to adversarial attacks.Unfortunately,the underlying mechanisms remain insufficiently understood,leading to empirical defenses that often fail against new attacks.In this... Deep neural networks are known to be vulnerable to adversarial attacks.Unfortunately,the underlying mechanisms remain insufficiently understood,leading to empirical defenses that often fail against new attacks.In this paper,we explain adversarial attacks from the perspective of robust features,and propose a novel Generative Adversarial Network(GAN)-based Robust Feature Disentanglement framework(GRFD)for adversarial defense.The core of GRFD is an adversarial disentanglement structure comprising a generator and a discriminator.For the generator,we introduce a novel Latent Variable Constrained Variational Auto-Encoder(LVCVAE),which enhances the typical beta-VAE with a constrained rectification module to enforce explicit clustering of latent variables.To supervise the disentanglement of robust features,we design a Robust Supervisory Model(RSM)as the discriminator,sharing architectural alignment with the target model.The key innovation of RSM is our proposed Feature Robustness Metric(FRM),which serves as part of the training loss and synthesizes the classification ability of features as well as their resistance to perturbations.Extensive experiments on three benchmark datasets demonstrate the superiority of GRFD:it achieves 93.69%adversarial accuracy on MNIST,77.21%on CIFAR10,and 58.91%on CIFAR100 with minimal degradation in clean accuracy.Codes are available at:(accessed on 23 July 2025). 展开更多
关键词 Adversarial defense robust features DISENTANGLEMENT VAE GAN
在线阅读 下载PDF
λ-return-based aircraft maneuvering for terminal defense and positioning guidance strategies
18
作者 DENG Shijie KOU Yingxin +2 位作者 LYU Maolong LI Zhanwu XU An 《Journal of Systems Engineering and Electronics》 2025年第6期1692-1708,共17页
Aiming at the terminal defense problem of aircraft,this paper proposes a method to simultaneously achieve terminal defense and seize the dominant position.The method employs aλ-return based reinforcement learning alg... Aiming at the terminal defense problem of aircraft,this paper proposes a method to simultaneously achieve terminal defense and seize the dominant position.The method employs aλ-return based reinforcement learning algorithm,which can be applied to the flight assistance decision-making system to improve the pilot’s survivability.First,we model the environment to simulate the interaction between air-to-air missiles and aircraft.Subsequently,we propose aλ-return based approach to improve the deep Q learning network(DQN),deep advantageous actor criticism(A2C),and proximity policy optimization(PPO)algorithms used to train manoeuvre strategies.The method employs an action space containing nine manoeuvres and defines the off-target distance at the end of the scene as a sparse reward for algorithm training.Simulation results show that the convergence speed of the three improved algorithms is significantly improved when using theλ-return method.Moreover,the effect of the fetch value on the convergence speed is verified by ablation experiments.In order to solve the illegal behavior problem in the training process,we also design a backtracking-based illegal behavior masking mechanism,which improves the data generation efficiency of the environment model and promotes effective algorithm training. 展开更多
关键词 λ-return terminal defense positioning guidance reinforcement learning
在线阅读 下载PDF
Exploratory Research on Defense against Natural Adversarial Examples in Image Classification
19
作者 Yaoxuan Zhu Hua Yang Bin Zhu 《Computers, Materials & Continua》 2025年第2期1947-1968,共22页
The emergence of adversarial examples has revealed the inadequacies in the robustness of image classification models based on Convolutional Neural Networks (CNNs). Particularly in recent years, the discovery of natura... The emergence of adversarial examples has revealed the inadequacies in the robustness of image classification models based on Convolutional Neural Networks (CNNs). Particularly in recent years, the discovery of natural adversarial examples has posed significant challenges, as traditional defense methods against adversarial attacks have proven to be largely ineffective against these natural adversarial examples. This paper explores defenses against these natural adversarial examples from three perspectives: adversarial examples, model architecture, and dataset. First, it employs Class Activation Mapping (CAM) to visualize how models classify natural adversarial examples, identifying several typical attack patterns. Next, various common CNN models are analyzed to evaluate their susceptibility to these attacks, revealing that different architectures exhibit varying defensive capabilities. The study finds that as the depth of a network increases, its defenses against natural adversarial examples strengthen. Lastly, Finally, the impact of dataset class distribution on the defense capability of models is examined, focusing on two aspects: the number of classes in the training set and the number of predicted classes. This study investigates how these factors influence the model’s ability to defend against natural adversarial examples. Results indicate that reducing the number of training classes enhances the model’s defense against natural adversarial examples. Additionally, under a fixed number of training classes, some CNN models show an optimal range of predicted classes for achieving the best defense performance against these adversarial examples. 展开更多
关键词 Image classification convolutional neural network natural adversarial example data set defense against adversarial examples
在线阅读 下载PDF
Protective effect and mechanisms of defense pile on bridge pier impacted by granular flows
20
作者 WU Yihan ZHU Zhiyuan +1 位作者 ZHENG Lu BI Yuzhang 《Journal of Mountain Science》 2025年第8期2960-2980,共21页
Bridge pier failures from granular flow impacts are common.Installing defense piles upstream is an effective mitigation strategy,yet their protective mechanisms and standardized design guidelines are unclear.This stud... Bridge pier failures from granular flow impacts are common.Installing defense piles upstream is an effective mitigation strategy,yet their protective mechanisms and standardized design guidelines are unclear.This study employed 3D discrete element method to analyze the influence of defense pile size and placement on its performance across 219 scenarios,providing a detailed examination of their protective mechanisms.Results show that optimizing these factors can reduce the maximum impact force on bridge piers by up to 94%.In terms of size,a critical height threshold is identified,beyond which increasing pile height does not enhance protection.This threshold depends on the movement height of granular particles at the slope base.Protection effectiveness varies with pile size:when H≤0.05 h(H is the height of defense piles,h is the height of bridge),protection marginally improves with increasing height and diameter;for 0.05 h<H<0.15 h,protection strongly correlates with both parameters;for H≥0.15 h,diameter becomes the dominant factor.In terms of placement,an optimal longitudinal distance exists between the defense pile and the bridge pier.The larger the diameter,the greater the optimal longitudinal distance.However,the transverse distance is inversely related to protection effectiveness.Mechanistic analysis shows that defense piles are more effective at redirecting particles to prevent direct collisions with the pier(contributing 100%impact energy reduction before the non-dimensional travel time t*=7.01 and 63%–100%afterward)than at reducing particle velocity.This study provides insights into the protective mechanisms of defense piles and informs strategies for optimizing bridge pier protection in granular flow-prone regions. 展开更多
关键词 Granular flow defense pile Bridge pier Discrete element method
原文传递
上一页 1 2 44 下一页 到第
使用帮助 返回顶部